
org.eclipse.jetty.ee8.security.authentication.ConfigurableSpnegoAuthenticator Maven / Gradle / Ivy
//
// ========================================================================
// Copyright (c) 1995 Mort Bay Consulting Pty Ltd and others.
//
// This program and the accompanying materials are made available under the
// terms of the Eclipse Public License v. 2.0 which is available at
// https://www.eclipse.org/legal/epl-2.0, or the Apache License, Version 2.0
// which is available at https://www.apache.org/licenses/LICENSE-2.0.
//
// SPDX-License-Identifier: EPL-2.0 OR Apache-2.0
// ========================================================================
//
package org.eclipse.jetty.ee8.security.authentication;
import java.io.IOException;
import java.io.Serializable;
import java.time.Duration;
import java.time.Instant;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.eclipse.jetty.ee8.nested.Authentication;
import org.eclipse.jetty.ee8.nested.Authentication.User;
import org.eclipse.jetty.ee8.nested.Request;
import org.eclipse.jetty.ee8.security.ServerAuthException;
import org.eclipse.jetty.ee8.security.UserAuthentication;
import org.eclipse.jetty.http.HttpHeader;
import org.eclipse.jetty.http.HttpMethod;
import org.eclipse.jetty.security.RoleDelegateUserIdentity;
import org.eclipse.jetty.security.SPNEGOLoginService;
import org.eclipse.jetty.security.SPNEGOUserPrincipal;
import org.eclipse.jetty.security.UserIdentity;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import static org.eclipse.jetty.ee8.nested.SessionHandler.ServletSessionApi.getOrCreateSession;
/**
* A LoginAuthenticator that uses SPNEGO and the GSS API to authenticate requests.
* A successful authentication from a client is cached for a configurable
* {@link #getAuthenticationDuration() duration} using the HTTP session; this avoids
* that the client is asked to authenticate for every request.
*
* @see SPNEGOLoginService
*/
public class ConfigurableSpnegoAuthenticator extends LoginAuthenticator {
private static final Logger LOG = LoggerFactory.getLogger(ConfigurableSpnegoAuthenticator.class);
private final String _authMethod;
private Duration _authenticationDuration = Duration.ofNanos(-1);
public ConfigurableSpnegoAuthenticator() {
this(SPNEGO_AUTH);
}
/**
* Allow for a custom authMethod value to be set for instances where SPNEGO may not be appropriate
*
* @param authMethod the auth method
*/
public ConfigurableSpnegoAuthenticator(String authMethod) {
_authMethod = authMethod;
}
@Override
public String getAuthMethod() {
return _authMethod;
}
/**
* Get the authentication duration.
* @return the authentication duration
*/
public Duration getAuthenticationDuration() {
return _authenticationDuration;
}
/**
* Sets the duration of the authentication.
* A negative duration means that the authentication is only valid for the current request.
* A zero duration means that the authentication is valid forever.
* A positive value means that the authentication is valid for the specified duration.
*
* @param authenticationDuration the authentication duration
*/
public void setAuthenticationDuration(Duration authenticationDuration) {
_authenticationDuration = authenticationDuration;
}
/**
* Only renew the session id if the user has been fully authenticated, don't
* renew the session for any of the intermediate request/response handshakes.
*/
@Override
public UserIdentity login(String username, Object password, ServletRequest servletRequest) {
Request baseRequest = Request.getBaseRequest(servletRequest);
if (baseRequest == null)
return null;
RoleDelegateUserIdentity user = (RoleDelegateUserIdentity) _loginService.login(username, password, baseRequest.getCoreRequest(), getOrCreateSession(servletRequest));
if (user != null && user.isEstablished())
renewSession(baseRequest, baseRequest.getResponse());
return user;
}
@Override
public Authentication validateRequest(ServletRequest req, ServletResponse res, boolean mandatory) throws ServerAuthException {
if (!mandatory)
return new DeferredAuthentication(this);
HttpServletRequest request = (HttpServletRequest) req;
HttpServletResponse response = (HttpServletResponse) res;
String header = request.getHeader(HttpHeader.AUTHORIZATION.asString());
String spnegoToken = getSpnegoToken(header);
HttpSession httpSession = request.getSession(false);
// We have a token from the client, so run the login.
if (header != null && spnegoToken != null) {
RoleDelegateUserIdentity identity = (RoleDelegateUserIdentity) login(null, spnegoToken, request);
if (identity.isEstablished()) {
if (!DeferredAuthentication.isDeferred(response)) {
if (LOG.isDebugEnabled())
LOG.debug("Sending final token");
// Send to the client the final token so that the
// client can establish the GSS context with the server.
SPNEGOUserPrincipal principal = (SPNEGOUserPrincipal) identity.getUserPrincipal();
setSpnegoToken(response, principal.getEncodedToken());
}
Duration authnDuration = getAuthenticationDuration();
if (!authnDuration.isNegative()) {
if (httpSession == null)
httpSession = request.getSession(true);
httpSession.setAttribute(UserIdentityHolder.ATTRIBUTE, new UserIdentityHolder(identity));
}
return new UserAuthentication(getAuthMethod(), identity);
} else {
if (DeferredAuthentication.isDeferred(response))
return Authentication.UNAUTHENTICATED;
if (LOG.isDebugEnabled())
LOG.debug("Sending intermediate challenge");
SPNEGOUserPrincipal principal = (SPNEGOUserPrincipal) identity.getUserPrincipal();
sendChallenge(response, principal.getEncodedToken());
return Authentication.SEND_CONTINUE;
}
} else // No token from the client; check if the client has logged in
// successfully before and the authentication has not expired.
if (httpSession != null) {
UserIdentityHolder holder = (UserIdentityHolder) httpSession.getAttribute(UserIdentityHolder.ATTRIBUTE);
if (holder != null) {
UserIdentity identity = holder._userIdentity;
if (identity != null) {
Duration authnDuration = getAuthenticationDuration();
if (!authnDuration.isNegative()) {
boolean expired = !authnDuration.isZero() && Instant.now().isAfter(holder._validFrom.plus(authnDuration));
// Allow non-GET requests even if they're expired, so that
// the client does not need to send the request content again.
if (!expired || !HttpMethod.GET.is(request.getMethod()))
return new UserAuthentication(getAuthMethod(), identity);
}
}
}
}
if (DeferredAuthentication.isDeferred(response))
return Authentication.UNAUTHENTICATED;
if (LOG.isDebugEnabled())
LOG.debug("Sending initial challenge");
sendChallenge(response, null);
return Authentication.SEND_CONTINUE;
}
private void sendChallenge(HttpServletResponse response, String token) throws ServerAuthException {
try {
setSpnegoToken(response, token);
response.sendError(HttpServletResponse.SC_UNAUTHORIZED);
} catch (IOException x) {
throw new ServerAuthException(x);
}
}
private void setSpnegoToken(HttpServletResponse response, String token) {
String value = HttpHeader.NEGOTIATE.asString();
if (token != null)
value += " " + token;
response.setHeader(HttpHeader.WWW_AUTHENTICATE.asString(), value);
}
private String getSpnegoToken(String header) {
if (header == null)
return null;
String scheme = HttpHeader.NEGOTIATE.asString() + " ";
if (header.regionMatches(true, 0, scheme, 0, scheme.length()))
return header.substring(scheme.length()).trim();
return null;
}
@Override
public boolean secureResponse(ServletRequest request, ServletResponse response, boolean mandatory, User validatedUser) {
return true;
}
private static class UserIdentityHolder implements Serializable {
private static final String ATTRIBUTE = UserIdentityHolder.class.getName();
private final transient Instant _validFrom = Instant.now();
private final transient UserIdentity _userIdentity;
private UserIdentityHolder(UserIdentity userIdentity) {
_userIdentity = userIdentity;
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy